Friday October 02, 2009 - 12pm ET / By Juan Calderon
Register to webinar
Content
|
|
With today’s extensive use of web applications to optimize and digitize the key processes of companies, most of the sensitive information of the organization, including customer private data, corporate secrets and other information assets are subject to being exposed to the Internet.
Identifying the level of risk those applications represent for a company is a primal task for information security officers. In an ideal world, one would be able to look for security bugs in every single application in the company’s inventory to determine the company’s overall security position. However, full-blown testing would be overwhelming and too expensive. At the same time, a timid approach could leave the organization exposed to a security breach, which may lead to financial and reputation losses.
A balanced approach is the best way to adequately protect and safeguard the most important company assets first. It provides the overall picture of the company’s information assets exposure and allows the company to make the right decisions regarding where the fixing efforts should be spent. This white paper will share some key tactics that can help answer the following questions:
There are no straight answers to these questions, as an effective approach should be tailored to the specific needs and goals of the organization and its industry.